API - Attacking Authentication

What is Authentication?

It's a proof of identity for applications using bearer tokens, HTTP Token validation, JWT, OAUTH 2.0, etc. 

HTTP token validation is used across the application to forward requests with unique token identifications. (It's vulnerable to make its own generation of a particular token ID, with credentials encoded with every request)

Example Scenario: Bringing the passport to the airport.

Attacking Authentication?

brute-force-app.zip

unzip brute-force-app.zip

cd brute-force-app

sudo docker-compose build

sudo docker-compose up


The above application page shows that the username is correct and the password is incorrect. Its indication tells us to perform brute force for the cracked password.


Create the Nano, Vim, or any text editor.






Attacking Tokens


The scenario below verifies the token strength of the counts with the help of the sequencer in Burp Suite and finds the randomness of the value of the token.





In this scenario attacker modifies the last 3 characters are random. It's a very vulnerable token for the application due to the not hard of token generation.










CyberChef - Decode the token values.





JWT Tokens
















Comments

Popular posts from this blog

Burp Suite – Automated Vulnerabilities Findings

SQL Injection Attacks | Shahul Hameed

To use emulator(Using NOX emulator): Open Appie Application | Shahul Hameed